Professional Documents
Culture Documents
Detailed Table of Contents For Certificate In: Cybersecurity Policy
Detailed Table of Contents For Certificate In: Cybersecurity Policy
Cybersecurity Policy
Email: info@facyber.com
Page 1 of 9
Chapter -1 Structure of Information Systems
COMPUTER FUNDAMENTALS
1.2ORGANIZATION OF COMPUTER
1.5COMPUTER LANGUAGE
FUNDAMENTAL OF INTERNET
1.6HISTORY OF INTERNET
1.7SERVICE OF INTERNET
NUMBER SYSTEM
MISCELLANEOUS
1.20RISK MANAGEMENT
Page 2 of 9
1.22DISASTER RECOVERY
ACCOUNT ADMINISTRATION
2.5ACCOUNT MAINTENANCE
2.6ACCOUNT, LOG, AND JOURNAL MONITORING
2.7ACCESS RIGHTS AND PERMISSIONS
ACCOUNT ACCESSIBILITY
2.8IDENTIFICATION
2.9AUTHENTICATION
2.10AUTHORIZATION
AUTHENTICATION TECHNIQUES
2.11PASSWORD
2.12BIOMETRICS
2.13RFID CARD
2.14TOKEN
NETWORKING & TYPES
2.16TYPES OF NETWORK
ISO MODEL
Page 3 of 9
NETWORKING DEVICES & TOPOLOGIES
2.19NETWORK DEVICES
2.20NETWORK TOPOLOGY
IP ADDRESS
2.21WHAT IS IP ADDRESS?
2.28WHAT IS VULNERABILITY?
2.30LIST OF TOOLS
2.31TYPES OF ATTACKS
HACKING
Page 4 of 9
3.6GOALS ATTACKERS TRY TO ACHIEVE
3.7INFORMATION GATHERING
3.8SCANNING
3.9GAINING ACCESS
3.10MAINTAINING ACCESS
3.11COVERING TRACKS
3.20SECURITY IMPLEMENTATION
Page 5 of 9
Chapter -4 BYOD & SMAC Security
SMAC
4.2OBJECTIVES
4.3SOCIAL
4.4SMAC- MOBILE
4.5SMAC- ANALYTICS
4.6SMAC- CLOUD
4.9SMAC IMPLEMENTATION
BYOD
4.11WHAT IS BYOD?
4.12NEW TRENDS
4.13BYOD IN ENTERPRISE
4.14ADVANTAGE
4.15DISADVANTAGE
Page 6 of 9
5.1WHAT IS CYBER ATTACK ? [ VIDEO ]
6.4CYBERSECURITY TECHNIQUES
6.5CYBER ETHICS
7.4ETHICS IN BUSINESS
7.6POLICY
8.2PURPOSE OF POLICY
Page 7 of 9
8.3SECURITY POLICY VS. LAWS
8.8POLICIES TYPES
8.9POLICY STANDERS
8.10POLICY TROUBLESHOOTING
GLOBAL CYBERSECURITY
10.1INTRODUCTION [ VIDEO ]
Page 8 of 9
10.7LEGAL PROCESS & PUNISHMENT
CYBERSECURITY POLICY
11.5VULNERABILITY PREVENTION
11.9CONCLUSION
Page 9 of 9